End-to-middle Security in the Session Initiation Protocol (SIP)

Document Type Expired Internet-Draft (sip WG) - resurrect requested by Cullen Jennings
Authors Kumiko Ono  , Shinya Tachimoto 
Last updated 2015-10-14 (latest revision 2007-07-11)
Stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired (IESG: Dead)
Action Holders
Consensus Boilerplate Unknown
Telechat date
Responsible AD Cullen Jennings
IESG note PROTO shepherd is Dean Willis
Send notices to fluffy@cisco.com, rohan.mahy@plantronics.com

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at


Some services provided by intermediaries depend on their ability to inspect a message body in the Session Initiation Protocol (SIP). When sensitive information is included in the message body, a SIP User Agent (UA) needs to protect it from other intermediaries than those that the UA agreed to disclose it to. This document proposes a mechanism for securing information passed between an end user and intermediaries using S/MIME. It also proposes mechanisms for a UA to discover intermediaries which need to inspect an S/MIME-secured message body, or to receive the message body with data integrity This specification is approved at the proposed standards level due to the IANA registration requirements. Is is of sufficient quality for that level, however, the use of this mechanism in this specification are considered experimental.


Kumiko Ono (ono.kumiko@lab.ntt.co.jp)
Shinya Tachimoto (tachimoto.shinya@lab.ntt.co.jp)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)